Bugs fixes in "linux-mtk"
Origin | Bug number | Title | Date fixed |
---|---|---|---|
Launchpad | 2081696 | [g1200] Call trace appeared when reload mtk_rng module | 2024-10-22 |
Launchpad | 2081699 | [g700] support p1v4 hardware | 2024-10-22 |
Launchpad | 2084626 | [g510] ddc failed message when the monitor does not support SCDC | 2024-10-22 |
CVE | CVE-2024-26677 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Fix delayed ACKs to not set the reference serial number Fix the construc | 2024-10-21 |
CVE | CVE-2024-27012 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: restore set elements when delete set fails From abort pat | 2024-10-21 |
CVE | CVE-2024-42228 | In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Using uninitialized value *size when calling amdgpu_vce_cs_reloc In | 2024-10-21 |
CVE | CVE-2024-38570 | In the Linux kernel, the following vulnerability has been resolved: gfs2: Fix potential glock use-after-free on unmount When a DLM lockspace is rel | 2024-10-21 |
CVE | CVE-2024-42160 | In the Linux kernel, the following vulnerability has been resolved: f2fs: check validation of fault attrs in f2fs_build_fault_attr() - It missed to | 2024-10-21 |
CVE | CVE-2024-39496 | In the Linux kernel, the following vulnerability has been resolved: btrfs: zoned: fix use-after-free due to race with dev replace While loading a z | 2024-10-21 |
CVE | CVE-2024-39494 | In the Linux kernel, the following vulnerability has been resolved: ima: Fix use-after-free on a dentry's dname.name ->d_name.name can change on re | 2024-10-21 |
CVE | CVE-2024-41009 | In the Linux kernel, the following vulnerability has been resolved: bpf: Fix overrunning reservations in ringbuf The BPF ring buffer internally is | 2024-10-21 |
CVE | CVE-2024-27397 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: use timestamp to check for set element timeout Add a time | 2024-10-21 |
CVE | CVE-2024-38630 | In the Linux kernel, the following vulnerability has been resolved: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger When the | 2024-10-21 |
CVE | CVE-2024-45016 | In the Linux kernel, the following vulnerability has been resolved: netem: fix return value if duplicate enqueue fails There is a bug in netem_enqu | 2024-10-21 |
Launchpad | 2072617 | Jammy update: v5.15.161 upstream stable release | 2024-10-21 |
Launchpad | 2073092 | net/sched: Fix conntrack use-after-free | 2024-10-21 |
Launchpad | 2072858 | Fix L2CAP/LE/CPU/BI-02-C bluetooth certification failure | 2024-10-21 |
Launchpad | 2074215 | [SRU] UBSAN warnings in bnx2x kernel driver | 2024-10-21 |
Launchpad | 2075170 | Jammy update: v5.15.163 upstream stable release | 2024-10-21 |
Launchpad | 2076334 | jammy:linux bpf selftest do not build | 2024-10-21 |
About
-
Send Feedback to @ubuntu_updates